Sciweavers

1285 search results - page 247 / 257
» Information systems revisited - the general continuous case
Sort
View
MM
2005
ACM
128views Multimedia» more  MM 2005»
14 years 28 days ago
Perceptual media compression for multiple viewers with feedback delay
Human eyes have limited perception capabilities; for example, only 2 degrees of our 140 degree vision field provide the highest quality of perception. Due to this fact the idea of...
Oleg Komogortsev, Javed I. Khan
MSWIM
2005
ACM
14 years 28 days ago
Decentralized intrusion detection in wireless sensor networks
Wireless sensor networks (WSNs) have many potential applications. Furthermore, in many scenarios WSNs are of interest to adversaries and they become susceptible to some types of a...
Ana Paula R. da Silva, Marcelo H. T. Martins, Brun...
OOPSLA
2004
Springer
14 years 21 days ago
Modeling event driven applications with a specification language (MEDASL)
Radio Frequency Identification (RFID) technology provides the means to track any object, any time, anywhere with Electronic Product Codes (EPC). A major consequence of this techno...
Murali Kaundinya, Ali Syed
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 18 days ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
CIAC
2003
Springer
98views Algorithms» more  CIAC 2003»
14 years 18 days ago
Improving Customer Proximity to Railway Stations
Abstract. We consider problems of (new) station placement along (existing) railway tracks, so as to increase the number of users. We prove that, in spite of the NP-hardness for the...
Evangelos Kranakis, Paolo Penna, Konrad Schlude, D...